Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Underwater acoustic sensor networks (UW-ASNs) are deployed in the water to gather the information of interest. They can gather information regarding temperature, pressure, pollution and environment of the ocean. There is requirement of energy efficient routing protocols to convey information to the sink. Energy efficient routing protocols used in terrestrial networks are not suitable for underwater...
Vehicular Ad Hoc Network (VANET) is a subgroup of mobile ad hoc network (MANET). It is an emerging new technology to exchange information between vehicles to vehicles. VANETs are considered as one of the most noticeable technologies for improving the efficiency and safety of transportation systems. VANET mainly used to exchange traffic information between the vehicles and prevent accident. In VANETs...
Ad hoc On Demand Distance Vector (AODV) routing is an extensively accepted routing protocol for Mobile Ad hoc Network (MANET). The inadequacy of security considerations in the design of AODV makes it vulnerable to black hole attack. In a black hole attack, malicious nodes attract data packets and drop them instead of forwarding. Among the existing black hole detection schemes, just a few strategies...
In wireless ad-hoc networks, the spectrum will not be efficiently used. It will be subdivided into a number of frequency bands and allocated to use by the licensed users for different applications. The spectrum will be unused if it is not used by the licensed users. Cognitive radio technology overcomes this problem. The Cognitive Radio Network provides the fesibility that the unused licensed spectrum...
This paper proposes one energy aware routing algorithm for wireless Ad Hoc network called Reliable Minimum Energy Routing (RMER). In Ad-Hoc network nodes are working completely on battery power. Energy efficiency is one of the challenge in wireless Ad-Hoc network. RMER is energy efficient routing algorithm capable of finding routes in such a way that the total energy required for transferring of packet...
This paper is concerned with a crucial problem of MANET which is congestion control (CongClt). CongClt can be described as a mechanism used to control congestion (Cong) and keep the traffic below the capacity of the network. Many approaches have been proposed to overcome CongClt in Ethernet as well as in MANET. Controlling the Cong in MANET is quite difficult due to its fundamental characteristics...
In this work, we have proposed a reliable, power efficient and high throughput routing protocol named Energy Efficient and Reliable Data Transfer (EERDT) for WBAN. We used hierarchical routing to minimize energy consumption and single-hop routing to transfer critical data directly to base station. ATTEMPT protocol abbreviated as Adaptive Threshold-based Thermal-aware Energy-efficient Multi-hop Protocol...
Wireless Body Area Networks (WBANs) consists of biosensors which are used for health monitoring and diagnostic purposes. Moreover, the biosensors are constrained to the issue such as link quality, delay and multihop energy consumption. In order to overcome these issue an Optimized Fuzzy based Swarm Routing (OFSR) is proposed for WBAN. In this technique, first selection of best node is done based on...
Wireless Sensor Networks (WSNs) are resource confined. Energy is one of the most important resources in such networks. Therefore, flawless use of energy is necessary. In this work, an enhanced scheme is proposed called Fault Tolerant Clustering Protocol for Mobile WSN (FTCP-MWSN) with mobile sensor nodes. This protocol is not only energy efficient but also reliable. Moreover, it does not require any...
Starting from the presence of a regional optical fiber network dedicated to the Public Administrations (the Lepida Network) and from the needs of the territory, in Emilia Romagna a regional datacenter spread over several locations has been fulfilled; this datacenter, among others also aims to deliver Platform as a Service (PaaS), and in particular cloud database services, to Local Authorities (Public...
In MANET nodes are power constrained, for the reason that nodes has operated with limited battery energy or power. The nodes in network are not communicated with each other because of early depletion of mode energy. The nodes which are completely lost their energy in network are not possible to further communicate with other nodes without the replacement or charge the battery of node in dynamic network...
Trust is the matter of reliance by which one can share information to other for specific task. Trust management gives the schematic survey of trustworthy path selection across mobile ad hoc network. This trustworthiness depends on the reliance of trusted path selection and trust management hierarchy. The trust management is the open area in terms of mobile ad hoc networks, to establish trust across...
End-to-end communication usually adopts a single path to transmit interactive packets in traditional routing mechanisms, so attackers can easily snoop into the whole communication trace to analyze users' typical features and to predict users' next-behaviors, which can severely decrease the security of users' information. Thus, this paper puts forward a multi-path based link-state routing mechanism,...
Datacenter networks (particularly, in clouds) nowadays support varieties of services from customers, and a novel paradigm, Software Defined Networking (SDN), is proposed to offer flexible application-aware management of these networks. However, as networks keep scaling up, many difficulties arise. Unlike prior studies on the data plane in SDN, this paper investigates the increasing complexity from...
Secure data collection is an important problem in wireless sensor networks. Different approaches have been proposed. One of them is overhearing. We investigate the problem of constructing a shortest path overhearing tree with the maximum lifetime. We propose three approaches. The first one is a polynomial-time heuristic. The second one uses ILP (Integer Linear Programming) to iteratively find a monitoring...
Most existing mobile ad hoc network (MANET) routing protocols use the minimum number of hops as a routing metric. These paths tend to contain long range links that may degrade both throughput and reliability. Higher throughput can be achieved by using short but effective links. The main problem with existing protocols is that they use only receiver signal strength indicator (RSSI) value to assess...
This paper presents a technique to extend the transmission range over a single RS-485 cable, without requiring installation of expensive and cumbersome RS-485 repeaters, to virtually unlimited distances, while simultaneously improving transmission speeds between closer nodes. This was accomplished by leveraging the routing capabilities embedded into each node that implements the recently released...
Reliability is the vital requirement in Wireless Sensor Networks (WSNs). Most routing protocols in WSNs assume that every node in the network is trustworthy. However, due to the open medium, the wide distribution, and the lack of nodes' physical protection, attackers can easily compromise WSNs by inserting misbehaving nodes, black hole attacks, into the network. In this paper a special end-to-end...
Wireless sensor-actuator networks are gaining ground as the communication infrastructure for process monitoring and control. Industrial applications demand a high degree of reliability and real-time guarantees in communication. Because wireless communication is susceptible to transmission failures in industrial environments, industrial wireless standards such as WirelessHART adopt reliable graph routing...
In vehicular communications, the current standards can be applied for safety-related message exchange but in the future world, other new applications like autonomous controlled vehicles require more reliability and capacity with small delay. Moreover, the harsh communication environment is one of the most difficult challenges. The line-of-sight (LOS) component of the signal in inter-vehicle connectivity...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.